A new ATM malware has hit the streets and it’s called Suceful. This new malware seems to have been created in August 2015, and it is unclear if it is still under
Hackers linked to known North Korean attack points and methods exploited a zero-day vulnerability in the Hangul Word Processor (HWP), widely deployed in the offices of the South Korean government.
It didn’t take long for hackers to take advantage of the malware’s bolt-on structure and transform it into something dangerous. The modular CoreBot malware has risen in sophistication almost overnight
Russia’s Pawn Storm group uses a malware dropper based on the leaked Carberp source code. A group of hackers that target military and government organizations has recently borrowed code from
Crooks can thrive by ‘living off the land’ rather than forging elaborate schemes. Half of all breaches Dell’s SecureWorks outfit has responded to over the last year have been a
Heimdal Security researchers have observed a new ransomware campaign that utilizes the Neutrino exploit kit to deliver Teslacrypt ransomware to victims via websites running older version of the WordPress CMS.
Online daters risk being held to ransom in possible cyber attack on Match.com Match.com has suspended advertising on its UK site whilst investigating amalware issue that put singles looking for love
During the course of our daily malware hunt, we came across a new mobile ransomware variant that leverages pornography to lure victims into downloading and installing it. We’d previously blogged
New variants of the notorious Carbanak Trojan have surfaced in Europe and the United States, and researchers say that the malware now has its own proprietary communications protocol and the samples
A new variant of mobile ransomware that encrypts the content of Android smartphones is putting a new spin on both how it communicates with its masters and how it spurs
Ransomware, the biggest pain that is causing many PC and laptop completely encrypted. If you don’t have money or brains, you cannot survive. It encrypts your important data, it can
Fears that malware is hiding in people’s graphics chipsets may be overclocked, according to Intel Security. Earlier this year, researchers from the self-styled “Team JellyFish” released a proof-of-concept software nasty
A new piece of data-stealing malware has a real thirst for credentials—and the potential for worse trouble down the line. IBM today published a report on CoreBot, generic information-stealing malware